-
Notifications
You must be signed in to change notification settings - Fork 348
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Win 1909 Enterprise socket timeout #9
Comments
hi, how many times have you tried? what is the stop code? thank you |
Hi. My stop code is "overwrote HalpInterruptController pointer, should have execution shortly...", but I didn't get shell. |
Hello, have tried it like 5 times or so. BUT I was trying it again just now and discovered that I have accidentally used python version 2.7.18 which forces the described crash reliably.. Windows error code: KMODE EXCEPTION NOT HANDLED Sorry for confusion! Tried it again then with python3 like 10 times. Get this result every time: python3 exploit.py -ip 192.168.100.51 |
Got Bluescreen now with correct execution (py3) Win error: IRQL NOT LESS OR EQUAL |
Get BLs now reliable with IRQL NOT LESS OR EQUAL error after second to fourth execution of exploit.py |
did you replace payload like it says in the README? |
Thank you for your reply. I have reproduced it successfully. |
could you please show your successful working environment? Since I got read primitive failed on Vmware + win10 1909 |
hello,I can't find low_stub,can you tell why your code write so,do you study some paper? |
what is low stub? why you write so to get it? |
This exploit code has a low success rate. I tried it more than ten times before it succeeded once. |
Reducing the number of processor cores in the VM increases reliability due to the physical read primitive. |
|
I think your code only success on win10 with UEFI,I always failed on win10 with BIOS.DO you have some suggestion? |
Followup on #5 (comment)
The text was updated successfully, but these errors were encountered: